Views:

The Secure Access Rules screen provides you an overview of the secure access rules that you have created to mitigate different risks across your network environment.

Before creating a secure access rule, grant the following permissions or complete the following configurations:
Action
Description
Create a secure access rule
Secure access rules control the way users can access and use your organization's network environment. The rules enable you to respond to risky behavior or suspicious entities and activities in your environment, so that you can perform dynamic control over access to internal and cloud applications by risk, identity, time, and location.
Check secure access rule details
Click the Risk Control, Private Access Control or Internet Access Control tab to view all the configured rules for your organization.
Click a rule name to edit the rule as needed.
Change the secure access rule status
Click the toggle under Status to enable or disable a rule.
Copy or delete a rule
  • Click the delete icon (trash-icon.png) to delete the rule
  • Click the copy icon (duplicate.jpg) to copy and modify the rule
Prioritize secure access rules
Rules are applied in order from the highest priority to lowest priority.
  • Risk control rules: Select a rule template from the drop-down list, and then drag a rule and place it at the desired priority.
  • Private access control and internet access control rules: Drag a rule and place it at the desired priority.
    For the Private Access Control and Internet Access Control rule types, Trend Vision One provides a default rule respectively, which always has the lowest priority.
Filter secure access rules
  1. Click the Risk Control, Private Access Control or Internet Access Control tab.
  2. Use the Rule template, Search by dropdown lists and the search field to filter rules.